Toward Improved Deep Learning-based Vulnerability Detection

A Sejfia, S Das, S Shafiq, N Medvidović - Proceedings of the 46th IEEE …, 2024 - dl.acm.org
Deep learning (DL) has been a common thread across several recent techniques for
vulnerability detection. The rise of large, publicly available datasets of vulnerabilities has …

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

MT Khorshed, ABMS Ali, SA Wasimi - Future Generation computer systems, 2012 - Elsevier
The long-term potential benefits through reduction of cost of services and improvement of
business outcomes make Cloud Computing an attractive proposition these days. To make it …

Predicting missing information of key aspects in vulnerability reports

H Guo, Z Xing, X Li - arXiv preprint arXiv:2008.02456, 2020 - arxiv.org
Software vulnerabilities have been continually disclosed and documented. An important
practice in documenting vulnerabilities is to describe the key vulnerability aspects, such as …

First principles vulnerability assessment

JA Kupsch, BP Miller, E Heymann… - Proceedings of the 2010 …, 2010 - dl.acm.org
Clouds and Grids offer significant challenges to providing secure infrastructure software. As
part of a our effort to secure such middleware, we present First Principles Vulnerability …

Detecting the impact of software vulnerability on attacks: A case study of network telescope scans

A Houmz, G Mezzour, K Zkik, M Ghogho… - Journal of Network and …, 2021 - Elsevier
Network scanning is one of the first steps in gathering information about a target before
launching attacks. It is used to scan for vulnerable devices and exposed services in order to …

Security validation testing environment in the cloud

C Bucur, E Babulak - … International Conference on Big Data (Big …, 2019 - ieeexplore.ieee.org
Researchers are trying to find new ways of finding and pointing out Cybersecurity
vulnerabilities by using innovative metrics. New theoretical proposals need to be tested in a …

Threat-specific security risk evaluation in the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Cloud Computing, 2018 - ieeexplore.ieee.org
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …

How CVSS is DOSsing your patching policy (and wasting your money).

L Allodi, F Massacci - blackhat USA 2013, 27 July-1 August 2013 …, 2013 - research.tue.nl
CVSS score is widely used as the standard-de-facto risk metric for vulnerabilities, to the
point that the US Government itself encourages organizations in using it to prioritize …

A quantitative threat modeling approach to maximize the return on security investment in cloud computing

A Schilling, B Werners - … of the International Conference on Cloud …, 2013 - books.google.com
The number of threats to cloud-based systems increases and likewise does the demand for
effective approaches to assess and improve security of such systems. The loss …

Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …